scispace - formally typeset
Search or ask a question
Topic

State (computer science)

About: State (computer science) is a research topic. Over the lifetime, 24436 publications have been published within this topic receiving 225733 citations.


Papers
More filters
Patent
Daniel Hiltgen1, Rene W. Schmidt1
19 Dec 2007
TL;DR: In this paper, the authors present a method comprising of accessing units of network storage that encode state data of respective virtual machines, wherein the state data for respective ones of the virtual machines are stored in distinct ones of each of the network storage units such that the data for more than one virtual machine are not commingled in any one network storage unit.
Abstract: Some embodiments of the present invention include a method comprising: accessing units of network storage that encode state data of respective virtual machines, wherein the state data for respective ones of the virtual machines are stored in distinct ones of the network storage units such that the state data for more than one virtual machine are not commingled in any one of the network storage units.

131 citations

Patent
Xavier Andrieu1
05 May 1994
TL;DR: In this paper, the authors present a system for recognizing and managing electrochemical cells connected to an application, which is characterized by the fact that it comprises an electronic memory associated with the cells, and circuitry for reading from the memory and writing in the memory, the read write circuitry being placed in the application, the electronic memory comprising a non-erasable first portion containing information enabling the cell to be identified, and a second portion which may be modified or erased.
Abstract: The present invention provides a system for recognizing and managing electrochemical cells connected to an application, the system being characterized by the fact that it comprises an electronic memory associated with the cells, and circuitry for reading from the memory and writing in the memory, the read write circuitry being placed in the application, the electronic memory comprising a non-erasable first portion containing information enabling the cell to be identified, and a second portion which may be modified or erased, and which contains information about the operation and the state of the cell.

131 citations

Journal Article
TL;DR: The main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C′ realizing the same functionality, which can successfully detect any serious tampering and erase all data in the memory.
Abstract: Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an unbounded number of wires, anywhere in the circuit. In contrast, all previous works on protecting cryptographic hardware relied on an assumption that some portion of the circuit must remain completely free from tampering. We obtain the first feasibility results for such private circuits. Our main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C' realizing the same functionality. The transformed circuit can successfully detect any serious tampering and erase all data in the memory. In terms of the information available to the adversary, even in the presence of an unbounded number of adaptive wire faults, the circuit C' emulates a black-box access to C.

130 citations

Patent
07 Jun 1995
TL;DR: In this article, a computer-based on-line system is provided for demonstrating software programs to a potential purchaser. The system receives from an online system a software program to be demonstrated, and maintains the software program in a locked state in order to prevent unauthorized duplication of the program.
Abstract: A computer-based on-line system is provided for demonstrating software programs to a potential purchaser. The system receives from an on-line system a software program to be demonstrated, and maintains the software program in a locked state in order to prevent unauthorized duplication of the software program. The software program is enabled for execution upon selection by a user, and the user is allowed to subsequently operate or sample the software program. The system maintains the software program in the locked state during the sampling in order to prevent unauthorized duplication of the software program. The sampling of the software program is selectively disabled, such as when the user completes the sampling or if the system detects that the user is attempting to copy the sampled application.

130 citations

Patent
11 Oct 1995
TL;DR: A time entry and accounting system permitting employees to clock in and clock out from work at computerized time clocks located adjacent to their workstations using an individually encoded identification card is described in this paper.
Abstract: A time entry and accounting system permitting employees to clock in and clock out from work at computerized time clocks located adjacent to their workstations using an individually encoded identification card. The time clock is configured to have a normally closed state and an opened state and to move between states in response to a supervisor scanning his identification card. The computerized time clocks are interactively linked to a central computer and, upon an employee clocking in or out, the central computer receives appropriate signals from the time clock, and stores information corresponding to these signals in memory. The information stored in the memory of the computer is subsequently used to develop accounting records and reports, to generate payroll data, and to send signals to the time clocks. The time clock further includes a display screen permitting the time clock to display messages in response to signals sent by the central computer and a plurality of buttons permitting an employee or supervisor to send additional information to the central computer.

130 citations


Network Information
Related Topics (5)
Formal specification
18.3K papers, 370.6K citations
76% related
Model checking
16.9K papers, 451.6K citations
74% related
Software development
73.8K papers, 1.4M citations
73% related
Software construction
36.2K papers, 743.8K citations
72% related
Concurrency
13K papers, 347.1K citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20251
202426
202314,059
202232,515
2021467
2020690